Sciweavers

2316 search results - page 127 / 464
» The many forms of hypercomputation
Sort
View
127
Voted
ICCS
2004
Springer
15 years 10 months ago
Artificial Immune System against Viral Attack
Since the first computer virus has been found, scanning detection has been used as a primarily method in virus detection systems. As computer viruses and worms become more complex ...
Hyungjoon Lee, Wonil Kim, Manpyo Hong
ICIAR
2004
Springer
15 years 10 months ago
Improving the Boosted Correlogram
Abstract. Introduced seven years ago, the correlogram is a simple statistical image descriptor that nevertheless performs strongly on image retrieval tasks. As a result it has foun...
Nicholas R. Howe, Amanda Ricketson
IMR
2004
Springer
15 years 10 months ago
Visualizing Mesh Adaptation Metric Tensors
Riemannian metric tensors are used to control the adaptation of meshes for finite element and finite volume computations. To study the numerous metric construction and manipulat...
Ko-Foa Tchon, Julien Dompierre, Marie-Gabrielle Va...
INDOCRYPT
2004
Springer
15 years 10 months ago
Revisiting Fully Distributed Proxy Signature Schemes
In a proxy signature scheme, a potential signer delegates his capabilities to a proxy signer, who can sign documents on behalf of him. The recipient of the signature verifies both...
Javier Herranz, Germán Sáez
158
Voted
KES
2004
Springer
15 years 10 months ago
A Collaborative Multi-agent Based Workflow System
Agent based workflow systems are being discussed by many researchers for a long time. In this paper we present a new collaborative approach for workflow systems. Agents collaborate...
Bastin Tony Roy Savarimuthu, Maryam Purvis